From 403786da63a3b5fce3534a0da81310ab68735631 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 23 Feb 2024 20:00:35 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/44xxx/CVE-2023-44372.json | 10 ++++ 2023/49xxx/CVE-2023-49299.json | 5 ++ 2023/51xxx/CVE-2023-51393.json | 97 ++++++++++++++++++++++++++++++++-- 2023/51xxx/CVE-2023-51394.json | 79 +++++++++++++++++++++++++-- 2024/1xxx/CVE-2024-1831.json | 95 +++++++++++++++++++++++++++++++-- 2024/1xxx/CVE-2024-1832.json | 95 +++++++++++++++++++++++++++++++-- 2024/1xxx/CVE-2024-1833.json | 95 +++++++++++++++++++++++++++++++-- 2024/1xxx/CVE-2024-1862.json | 18 +++++++ 2024/1xxx/CVE-2024-1863.json | 18 +++++++ 2024/1xxx/CVE-2024-1864.json | 18 +++++++ 2024/1xxx/CVE-2024-1865.json | 18 +++++++ 2024/1xxx/CVE-2024-1866.json | 18 +++++++ 2024/1xxx/CVE-2024-1867.json | 18 +++++++ 2024/1xxx/CVE-2024-1868.json | 18 +++++++ 2024/23xxx/CVE-2024-23320.json | 5 ++ 2024/27xxx/CVE-2024-27323.json | 18 +++++++ 2024/27xxx/CVE-2024-27324.json | 18 +++++++ 2024/27xxx/CVE-2024-27325.json | 18 +++++++ 2024/27xxx/CVE-2024-27326.json | 18 +++++++ 2024/27xxx/CVE-2024-27327.json | 18 +++++++ 2024/27xxx/CVE-2024-27328.json | 18 +++++++ 2024/27xxx/CVE-2024-27329.json | 18 +++++++ 2024/27xxx/CVE-2024-27330.json | 18 +++++++ 2024/27xxx/CVE-2024-27331.json | 18 +++++++ 2024/27xxx/CVE-2024-27332.json | 18 +++++++ 2024/27xxx/CVE-2024-27333.json | 18 +++++++ 2024/27xxx/CVE-2024-27334.json | 18 +++++++ 2024/27xxx/CVE-2024-27335.json | 18 +++++++ 2024/27xxx/CVE-2024-27336.json | 18 +++++++ 2024/27xxx/CVE-2024-27337.json | 18 +++++++ 2024/27xxx/CVE-2024-27338.json | 18 +++++++ 2024/27xxx/CVE-2024-27339.json | 18 +++++++ 2024/27xxx/CVE-2024-27340.json | 18 +++++++ 2024/27xxx/CVE-2024-27341.json | 18 +++++++ 2024/27xxx/CVE-2024-27342.json | 18 +++++++ 2024/27xxx/CVE-2024-27343.json | 18 +++++++ 2024/27xxx/CVE-2024-27344.json | 18 +++++++ 2024/27xxx/CVE-2024-27345.json | 18 +++++++ 2024/27xxx/CVE-2024-27346.json | 18 +++++++ 39 files changed, 1019 insertions(+), 20 deletions(-) create mode 100644 2024/1xxx/CVE-2024-1862.json create mode 100644 2024/1xxx/CVE-2024-1863.json create mode 100644 2024/1xxx/CVE-2024-1864.json create mode 100644 2024/1xxx/CVE-2024-1865.json create mode 100644 2024/1xxx/CVE-2024-1866.json create mode 100644 2024/1xxx/CVE-2024-1867.json create mode 100644 2024/1xxx/CVE-2024-1868.json create mode 100644 2024/27xxx/CVE-2024-27323.json create mode 100644 2024/27xxx/CVE-2024-27324.json create mode 100644 2024/27xxx/CVE-2024-27325.json create mode 100644 2024/27xxx/CVE-2024-27326.json create mode 100644 2024/27xxx/CVE-2024-27327.json create mode 100644 2024/27xxx/CVE-2024-27328.json create mode 100644 2024/27xxx/CVE-2024-27329.json create mode 100644 2024/27xxx/CVE-2024-27330.json create mode 100644 2024/27xxx/CVE-2024-27331.json create mode 100644 2024/27xxx/CVE-2024-27332.json create mode 100644 2024/27xxx/CVE-2024-27333.json create mode 100644 2024/27xxx/CVE-2024-27334.json create mode 100644 2024/27xxx/CVE-2024-27335.json create mode 100644 2024/27xxx/CVE-2024-27336.json create mode 100644 2024/27xxx/CVE-2024-27337.json create mode 100644 2024/27xxx/CVE-2024-27338.json create mode 100644 2024/27xxx/CVE-2024-27339.json create mode 100644 2024/27xxx/CVE-2024-27340.json create mode 100644 2024/27xxx/CVE-2024-27341.json create mode 100644 2024/27xxx/CVE-2024-27342.json create mode 100644 2024/27xxx/CVE-2024-27343.json create mode 100644 2024/27xxx/CVE-2024-27344.json create mode 100644 2024/27xxx/CVE-2024-27345.json create mode 100644 2024/27xxx/CVE-2024-27346.json diff --git a/2023/44xxx/CVE-2023-44372.json b/2023/44xxx/CVE-2023-44372.json index fab99572ae1..981e1029fc2 100644 --- a/2023/44xxx/CVE-2023-44372.json +++ b/2023/44xxx/CVE-2023-44372.json @@ -68,6 +68,16 @@ "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm", "refsource": "MISC", "name": "https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1842", + "refsource": "MISC", + "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1842" + }, + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-54.html", + "refsource": "MISC", + "name": "https://helpx.adobe.com/security/products/acrobat/apsb23-54.html" } ] }, diff --git a/2023/49xxx/CVE-2023-49299.json b/2023/49xxx/CVE-2023-49299.json index 5631e22b435..929a7775c76 100644 --- a/2023/49xxx/CVE-2023-49299.json +++ b/2023/49xxx/CVE-2023-49299.json @@ -64,6 +64,11 @@ "url": "https://lists.apache.org/thread/tnf99qoc6tlnwrny4t1zk6mfszgdsokm", "refsource": "MISC", "name": "https://lists.apache.org/thread/tnf99qoc6tlnwrny4t1zk6mfszgdsokm" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/02/23/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/02/23/3" } ] }, diff --git a/2023/51xxx/CVE-2023-51393.json b/2023/51xxx/CVE-2023-51393.json index 08c17a4ccad..f72157a1d9a 100644 --- a/2023/51xxx/CVE-2023-51393.json +++ b/2023/51xxx/CVE-2023-51393.json @@ -1,17 +1,106 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-51393", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@silabs.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "\nDue to an allocation of resources without limits, an uncontrolled resource consumption vulnerability exists in Silicon Labs Ember ZNet SDK prior to v7.4.0.0 (delivered as part of Silicon Labs Gecko SDK v4.4.0) which may enable attackers to trigger a bus fault and crash of the device, requiring a reboot in order to rejoin the network." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-770 Allocation of Resources Without Limits or Throttling", + "cweId": "CWE-770" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-400 Uncontrolled Resource Consumption", + "cweId": "CWE-400" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "silabs.com", + "product": { + "product_data": [ + { + "product_name": "Ember ZNet SDK", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "lessThan": "7.4.0.0", + "status": "unaffected", + "version": "0", + "versionType": "7.4.x" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://community.silabs.com/068Vm000001NaAM", + "refsource": "MISC", + "name": "https://community.silabs.com/068Vm000001NaAM" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "version": "3.1" } ] } diff --git a/2023/51xxx/CVE-2023-51394.json b/2023/51xxx/CVE-2023-51394.json index 8345548ff22..ef7210a7a65 100644 --- a/2023/51xxx/CVE-2023-51394.json +++ b/2023/51xxx/CVE-2023-51394.json @@ -1,17 +1,88 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-51394", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@silabs.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "High traffic environments may result in NULL Pointer Dereference vulnerability in Silicon Labs's Ember ZNet SDK before v7.4.0, causing a system crash." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-476 NULL Pointer Dereference", + "cweId": "CWE-476" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "silabs.com", + "product": { + "product_data": [ + { + "product_name": "Ember ZNet SDK", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "7.4.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://community.silabs.com/068Vm000001NL4u", + "refsource": "MISC", + "name": "https://community.silabs.com/068Vm000001NL4u" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "version": "3.1" } ] } diff --git a/2024/1xxx/CVE-2024-1831.json b/2024/1xxx/CVE-2024-1831.json index 399dcc56cdf..b27797dc805 100644 --- a/2024/1xxx/CVE-2024-1831.json +++ b/2024/1xxx/CVE-2024-1831.json @@ -1,17 +1,104 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-1831", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability, which was classified as critical, was found in SourceCodester Complete File Management System 1.0. Affected is an unknown function of the file users/index.php of the component Login Form. The manipulation of the argument username with the input torada%27+or+%271%27+%3D+%271%27+--+- leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-254622 is the identifier assigned to this vulnerability." + }, + { + "lang": "deu", + "value": "Es wurde eine Schwachstelle in SourceCodester Complete File Management System 1.0 gefunden. Sie wurde als kritisch eingestuft. Es geht dabei um eine nicht klar definierte Funktion der Datei users/index.php der Komponente Login Form. Mittels dem Manipulieren des Arguments username mit der Eingabe torada%27+or+%271%27+%3D+%271%27+--+- mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 SQL Injection", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SourceCodester", + "product": { + "product_data": [ + { + "product_name": "Complete File Management System", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.254622", + "refsource": "MISC", + "name": "https://vuldb.com/?id.254622" + }, + { + "url": "https://vuldb.com/?ctiid.254622", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.254622" + }, + { + "url": "https://toradah.notion.site/Login-Bypass-via-SQL-injection-b1e45264f6104bc696836ade6e60fb98?pvs=4", + "refsource": "MISC", + "name": "https://toradah.notion.site/Login-Bypass-via-SQL-injection-b1e45264f6104bc696836ade6e60fb98?pvs=4" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "torada (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 7.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + }, + { + "version": "3.0", + "baseScore": 7.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + }, + { + "version": "2.0", + "baseScore": 7.5, + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ] } diff --git a/2024/1xxx/CVE-2024-1832.json b/2024/1xxx/CVE-2024-1832.json index ecb35de418f..69b418abaa8 100644 --- a/2024/1xxx/CVE-2024-1832.json +++ b/2024/1xxx/CVE-2024-1832.json @@ -1,17 +1,104 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-1832", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been found in SourceCodester Complete File Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/ of the component Admin Login Form. The manipulation of the argument username with the input torada%27+or+%271%27+%3D+%271%27+--+- leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-254623." + }, + { + "lang": "deu", + "value": "In SourceCodester Complete File Management System 1.0 wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Dabei geht es um eine nicht genauer bekannte Funktion der Datei /admin/ der Komponente Admin Login Form. Mittels Manipulieren des Arguments username mit der Eingabe torada%27+or+%271%27+%3D+%271%27+--+- mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 SQL Injection", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SourceCodester", + "product": { + "product_data": [ + { + "product_name": "Complete File Management System", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.254623", + "refsource": "MISC", + "name": "https://vuldb.com/?id.254623" + }, + { + "url": "https://vuldb.com/?ctiid.254623", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.254623" + }, + { + "url": "https://toradah.notion.site/SQL-Injection-via-Admin-Login-Form-7372893848cb4bb996ae2c9effb0266a?pvs=25", + "refsource": "MISC", + "name": "https://toradah.notion.site/SQL-Injection-via-Admin-Login-Form-7372893848cb4bb996ae2c9effb0266a?pvs=25" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "torada (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 7.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + }, + { + "version": "3.0", + "baseScore": 7.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + }, + { + "version": "2.0", + "baseScore": 7.5, + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ] } diff --git a/2024/1xxx/CVE-2024-1833.json b/2024/1xxx/CVE-2024-1833.json index bba1d181366..5aea87eff6d 100644 --- a/2024/1xxx/CVE-2024-1833.json +++ b/2024/1xxx/CVE-2024-1833.json @@ -1,17 +1,104 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-1833", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in SourceCodester Employee Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /Account/login.php. The manipulation of the argument txtusername leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-254624." + }, + { + "lang": "deu", + "value": "Eine Schwachstelle wurde in SourceCodester Employee Management System 1.0 gefunden. Sie wurde als kritisch eingestuft. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Datei /Account/login.php. Durch das Manipulieren des Arguments txtusername mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 SQL Injection", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SourceCodester", + "product": { + "product_data": [ + { + "product_name": "Employee Management System", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.254624", + "refsource": "MISC", + "name": "https://vuldb.com/?id.254624" + }, + { + "url": "https://vuldb.com/?ctiid.254624", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.254624" + }, + { + "url": "https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/employee-management-system.md#2accountloginphp", + "refsource": "MISC", + "name": "https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/employee-management-system.md#2accountloginphp" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "webray.com.cn (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 7.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + }, + { + "version": "3.0", + "baseScore": 7.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + }, + { + "version": "2.0", + "baseScore": 7.5, + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ] } diff --git a/2024/1xxx/CVE-2024-1862.json b/2024/1xxx/CVE-2024-1862.json new file mode 100644 index 00000000000..b062db48d15 --- /dev/null +++ b/2024/1xxx/CVE-2024-1862.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1862", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/1xxx/CVE-2024-1863.json b/2024/1xxx/CVE-2024-1863.json new file mode 100644 index 00000000000..4bffacc0e77 --- /dev/null +++ b/2024/1xxx/CVE-2024-1863.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1863", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/1xxx/CVE-2024-1864.json b/2024/1xxx/CVE-2024-1864.json new file mode 100644 index 00000000000..c104675d121 --- /dev/null +++ b/2024/1xxx/CVE-2024-1864.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1864", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/1xxx/CVE-2024-1865.json b/2024/1xxx/CVE-2024-1865.json new file mode 100644 index 00000000000..b3e5a9a6601 --- /dev/null +++ b/2024/1xxx/CVE-2024-1865.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1865", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/1xxx/CVE-2024-1866.json b/2024/1xxx/CVE-2024-1866.json new file mode 100644 index 00000000000..63191881652 --- /dev/null +++ b/2024/1xxx/CVE-2024-1866.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1866", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/1xxx/CVE-2024-1867.json b/2024/1xxx/CVE-2024-1867.json new file mode 100644 index 00000000000..f37ac358de3 --- /dev/null +++ b/2024/1xxx/CVE-2024-1867.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1867", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/1xxx/CVE-2024-1868.json b/2024/1xxx/CVE-2024-1868.json new file mode 100644 index 00000000000..76efd492aa7 --- /dev/null +++ b/2024/1xxx/CVE-2024-1868.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-1868", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/23xxx/CVE-2024-23320.json b/2024/23xxx/CVE-2024-23320.json index 75e3d1181cc..5803df9f2c3 100644 --- a/2024/23xxx/CVE-2024-23320.json +++ b/2024/23xxx/CVE-2024-23320.json @@ -74,6 +74,11 @@ "url": "https://lists.apache.org/thread/p7rwzdgrztdfps8x1bwx646f1mn0x6cp", "refsource": "MISC", "name": "https://lists.apache.org/thread/p7rwzdgrztdfps8x1bwx646f1mn0x6cp" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/02/23/3", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2024/02/23/3" } ] }, diff --git a/2024/27xxx/CVE-2024-27323.json b/2024/27xxx/CVE-2024-27323.json new file mode 100644 index 00000000000..be9fd5df6f5 --- /dev/null +++ b/2024/27xxx/CVE-2024-27323.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-27323", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/27xxx/CVE-2024-27324.json b/2024/27xxx/CVE-2024-27324.json new file mode 100644 index 00000000000..0831c02b6b1 --- /dev/null +++ b/2024/27xxx/CVE-2024-27324.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-27324", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/27xxx/CVE-2024-27325.json b/2024/27xxx/CVE-2024-27325.json new file mode 100644 index 00000000000..0eb7ae465af --- /dev/null +++ b/2024/27xxx/CVE-2024-27325.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-27325", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/27xxx/CVE-2024-27326.json b/2024/27xxx/CVE-2024-27326.json new file mode 100644 index 00000000000..085643ed79d --- /dev/null +++ b/2024/27xxx/CVE-2024-27326.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-27326", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/27xxx/CVE-2024-27327.json b/2024/27xxx/CVE-2024-27327.json new file mode 100644 index 00000000000..d4f5285655e --- /dev/null +++ b/2024/27xxx/CVE-2024-27327.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-27327", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/27xxx/CVE-2024-27328.json b/2024/27xxx/CVE-2024-27328.json new file mode 100644 index 00000000000..c27b0214ac4 --- /dev/null +++ b/2024/27xxx/CVE-2024-27328.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-27328", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/27xxx/CVE-2024-27329.json b/2024/27xxx/CVE-2024-27329.json new file mode 100644 index 00000000000..f0b30b32d3d --- /dev/null +++ b/2024/27xxx/CVE-2024-27329.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-27329", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/27xxx/CVE-2024-27330.json b/2024/27xxx/CVE-2024-27330.json new file mode 100644 index 00000000000..d5b1ea42297 --- /dev/null +++ b/2024/27xxx/CVE-2024-27330.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-27330", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/27xxx/CVE-2024-27331.json b/2024/27xxx/CVE-2024-27331.json new file mode 100644 index 00000000000..7a32f73e139 --- /dev/null +++ b/2024/27xxx/CVE-2024-27331.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-27331", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/27xxx/CVE-2024-27332.json b/2024/27xxx/CVE-2024-27332.json new file mode 100644 index 00000000000..730f509572e --- /dev/null +++ b/2024/27xxx/CVE-2024-27332.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-27332", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/27xxx/CVE-2024-27333.json b/2024/27xxx/CVE-2024-27333.json new file mode 100644 index 00000000000..26eafa54298 --- /dev/null +++ b/2024/27xxx/CVE-2024-27333.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-27333", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/27xxx/CVE-2024-27334.json b/2024/27xxx/CVE-2024-27334.json new file mode 100644 index 00000000000..bb430dcc094 --- /dev/null +++ b/2024/27xxx/CVE-2024-27334.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-27334", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/27xxx/CVE-2024-27335.json b/2024/27xxx/CVE-2024-27335.json new file mode 100644 index 00000000000..e42ba00b7ce --- /dev/null +++ b/2024/27xxx/CVE-2024-27335.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-27335", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/27xxx/CVE-2024-27336.json b/2024/27xxx/CVE-2024-27336.json new file mode 100644 index 00000000000..b70eb7ea918 --- /dev/null +++ b/2024/27xxx/CVE-2024-27336.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-27336", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/27xxx/CVE-2024-27337.json b/2024/27xxx/CVE-2024-27337.json new file mode 100644 index 00000000000..8d390a8811c --- /dev/null +++ b/2024/27xxx/CVE-2024-27337.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-27337", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/27xxx/CVE-2024-27338.json b/2024/27xxx/CVE-2024-27338.json new file mode 100644 index 00000000000..1c3939bb9b4 --- /dev/null +++ b/2024/27xxx/CVE-2024-27338.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-27338", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/27xxx/CVE-2024-27339.json b/2024/27xxx/CVE-2024-27339.json new file mode 100644 index 00000000000..cc796a25080 --- /dev/null +++ b/2024/27xxx/CVE-2024-27339.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-27339", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/27xxx/CVE-2024-27340.json b/2024/27xxx/CVE-2024-27340.json new file mode 100644 index 00000000000..24938832a68 --- /dev/null +++ b/2024/27xxx/CVE-2024-27340.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-27340", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/27xxx/CVE-2024-27341.json b/2024/27xxx/CVE-2024-27341.json new file mode 100644 index 00000000000..2df58017b7a --- /dev/null +++ b/2024/27xxx/CVE-2024-27341.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-27341", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/27xxx/CVE-2024-27342.json b/2024/27xxx/CVE-2024-27342.json new file mode 100644 index 00000000000..a33498c7d92 --- /dev/null +++ b/2024/27xxx/CVE-2024-27342.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-27342", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/27xxx/CVE-2024-27343.json b/2024/27xxx/CVE-2024-27343.json new file mode 100644 index 00000000000..7685b524a33 --- /dev/null +++ b/2024/27xxx/CVE-2024-27343.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-27343", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/27xxx/CVE-2024-27344.json b/2024/27xxx/CVE-2024-27344.json new file mode 100644 index 00000000000..1bd60f7b3fb --- /dev/null +++ b/2024/27xxx/CVE-2024-27344.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-27344", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/27xxx/CVE-2024-27345.json b/2024/27xxx/CVE-2024-27345.json new file mode 100644 index 00000000000..bda1b9f31dd --- /dev/null +++ b/2024/27xxx/CVE-2024-27345.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-27345", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/27xxx/CVE-2024-27346.json b/2024/27xxx/CVE-2024-27346.json new file mode 100644 index 00000000000..68b31aaefa4 --- /dev/null +++ b/2024/27xxx/CVE-2024-27346.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-27346", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file